1 min read

Researchers Retrieve Hive Ransomware Master Encryption Key Using Algorithm Flaw

Vlad CONSTANTINESCU

February 21, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Researchers Retrieve Hive Ransomware Master Encryption Key Using Algorithm Flaw

Researchers recently announced they deciphered data encrypted with Hive ransomware without using the private key the malware generates to lock the content.

"By analyzing the encryption process of Hive ransomware, we confirmed that vulnerabilities exist by using their own encryption algorithm," according to a paper published by researchers from South Korea's Kookmin University. "We have recovered the master key for generating the file encryption key partially, to enable the decryption of data encrypted by Hive ransomware."

The team identified an encryption flaw in the mechanism the ransomware uses to generate and store keys. Hive ransomware only encrypts parts of the compromised documents instead of the whole file by using two keystreams originating from the master key.

Hive uses an XOR operation on the two keystreams to generate an encryption keystream, which is fused with the data and XORed in alternate blocks to create the encrypted file. While the technique works, it also lets experts guess the keystreams, restore the master key, and decipher the encrypted content without the malware's private key.

The research team reportedly devised a reliable method to recover almost all the encryption keys using the flaw. "We recovered 95% of the master key without the attacker's RSA private key and decrypted the actual infected data," according to the group of academics.

Much like other cybercrime groups, Hive runs a Ransomware-as-a-Service (Raas) operation that deploys various tools, techniques and tactics to attack businesses, exfiltrate and encrypt their data, and demand a ransom in exchange for access to the decryption key.

The gang also engages in double extortion schemes, where perpetrators threaten to leak exposed sensitive victim data on various websites if their demands are not met. Hive uses various techniques to breach networks, including compromised VPN credentials, phishing emails, and vulnerable RDP servers.

tags


Author



Right now

Top posts

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read
John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight

John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight

April 15, 2022

3 min read
Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users

Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users

April 14, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chinese Man Pleads Guilty to Cyberstalking, Stealing Identity of College Student Chinese Man Pleads Guilty to Cyberstalking, Stealing Identity of College Student
Alina BÎZGĂ

June 29, 2022

2 min read
Latest Firefox Update Adds Anti-Tracking URL-Stripping Feature Latest Firefox Update Adds Anti-Tracking URL-Stripping Feature
Vlad CONSTANTINESCU

June 29, 2022

1 min read
Deepfakes Used to Apply for Remote Work Jobs Deepfakes Used to Apply for Remote Work Jobs
Filip TRUȚĂ

June 29, 2022

2 min read